Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.2250 xmlbeans security update 29 June 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: xmlbeans Publisher: Debian Operating System: Debian GNU/Linux UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-23926 Original Bulletin: https://lists.debian.org/debian-lts-announce/2021/06/msg00024.html Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running xmlbeans check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - --=-+x/7O5iiQfdGJBpOMOWd Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2693-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany June 28, 2021 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : xmlbeans Version : 2.6.0+dfsg-1+deb9u1 CVE ID : CVE-2021-23926 The XML parsers used by XMLBeans did not set the properties needed to prote= ct the user from malicious XML input. Vulnerabilities include the possibility = for XML Entity Expansion attacks which could lead to a denial-of-service. This update implements sensible defaults for the XML parsers to prevent these ki= nd of attacks. For Debian 9 stretch, this problem has been fixed in version 2.6.0+dfsg-1+deb9u1. We recommend that you upgrade your xmlbeans packages. For the detailed security status of xmlbeans please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xmlbeans Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - --=-+x/7O5iiQfdGJBpOMOWd Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit - -----BEGIN PGP SIGNATURE----- iQKTBAABCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmDZ2VlfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeSJ2hAAuVaR4BfaKkKYyYMM8gD6LKAI3oMmoJ8eI5/EPyOxSLTZdJaEjfroGz/5 hU4gTWHCVEEKzqrdLJOkP2jPARQE9YBnvEa4z9nCP2UXTNBTaexs9ZcXtlndk2x6 hDj6eYoQpuBmtVtlJvzCVNipAERAX0ZFbdtfXP2chDuQypZtWXmyQ7JhYFEazrAF 5kBtbM8oxDwtkjgNtnc8e6rK+Za9ceZ0yF5t01XJ2Ke8/NUDrm8vrm5sL1RHgkkB 1LqIV3Rc7qlfumRErUNGWQULmu5VEnxxEFbYoPBq5gvx+MpZJIUh2xt5Oz+SXBu0 2BGno7jOUZz01ex74rF309tv2ukavpPDUyU1Y2k55X2/LE/AiWRU/xXgwJTJL4qj rlP8qa8uC2C1sDV0T3g7OiR7rauUaPwvuNPvqJUVcwManppAMX86rfAtKvc4xNkq Ix+NTLcNMZGjC/lT3f1YhlcbS8yGgOqlKGEgYdcNu9joiElKgzh3ycJX2r7UuGHL lhsmP2F+EJLzjS9/vql5O/0Xq4I3RJHFd292d53iiZ6a0ElNmuYXTK+LhEaS2+fN lcz+67iU5i/KEa3l8dmGkhgRRClD3QuVKVWjw6JB5myplqDvbmQZPfEKL8ujgCfS HPvIjsfYiLPNLNgkyTJdqIAsw9qxw67OMCNFnLmWrG4pH0j7v4A= =yl7D - -----END PGP SIGNATURE----- - --=-+x/7O5iiQfdGJBpOMOWd-- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYNqX5eNLKJtyKPYoAQiwgA//WNboDHzSAWcEiXiDFDDa1FCbX4c6ml7e UuXxJ3PTg106DUH165mKh6haFKmEfBkmXcom7e6tbGJ9kJpYl2zZ/BrYPL268V1+ hPrn92Ky9NNKXixiq4DUVucR66gwU/QDrQ+78shsg6Fq33OUbGcemBQd3eY5fyUq ozGFz1t/kDT53MQ2AVn5b1h0fcjNmwtH+vBMFFX4ksAOkoqvwiN5x1kpmfpoMCGN njT7xMaznhqCRx8pnlRIP6PyU+lOBTanEOitRBTZRxi7A2/PLo4r/C+kNb0SPZES 4gX6Un/PVwUf2SwryS481LgRbzVXRtKzSpw8ZTiqRpFfz4c6CmPC0PaWAf1DEVYa EG54JUhbAhYKwQOFH9EnJe9U5WoUNRvg25miZ0tyxOI1V/e9rj9I5qdQ+dhp87nO J7vtuhfLfnkc1Kp0lyyYapzD3me0JBk+qBg7IAtsecobh6wNADmLLI6iczY6sRju MiwKTSieebvMRUmi9RB+bMVk9J6zSzEs3gJ+nnoVmDXsZiwGuFbNJJT265l1O08j Rldo5sClobzz7OGX1mV1R6uJGozSTQpRU5Ktz0YT8KJWQnCoPFuASb3cxEmoHMMT 29i8GEab56hVOskFMm5FEzR2Co7tvH08EeSj2fMmiCLYc8nLoM0+pxrUZnWNTcKG H2Pl3gGfwYk= =nSlz -----END PGP SIGNATURE-----